THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION

Size: px
Start display at page:

Download "THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION"

Transcription

1 T OPICS IN WIRELESS SECURITY THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY KRISTIN LAUTER, MICROSOFT CORPORATION Q 2 = R 1 Q 2 R 1 R 1 As the wireless industry explodes, it faces a growing need for security. Both for secure (authenticated, private) Web transactions and for secure (signed, encrypted) messaging, a full and efficient Public Key Infrastructure is needed. ABSTRACT This article provides an overview of elliptic curves and their use in cryptography. The focus is on the performance advantages to be obtained in the wireless environment by using elliptic curve cryptography instead of a traditional cryptosystem like RSA. Specific applications to secure messaging and identity-based encryption are discussed. INTRODUCTION Forecasters predict more than a billion wireless users by As the wireless industry explodes, it faces a growing need for security. Applications in sectors of the economy such as healthcare, financial services, and government depend on the underlying security already available in the wired computing environment. Both for secure (authenticated, private) Web transactions and for secure (signed, encrypted) messaging, a full and efficient public key infrastructure is needed. Three basic choices for public key systems are available for these applications: RSA Diffie-Hellman (DH) or Digital Signature Algorithm (DSA) modulo a prime p Elliptic Curve Diffie-Hellman (ECDH) or Elliptic Curve Digital Signature Algorithm (ECDSA) RSA is a system that was published in 1978 by Rivest, Shamir, and Adleman, based on the difficulty of factoring large integers. Whitfield Diffie and Martin Hellman proposed the public key system now called Diffie-Hellman Key Exchange in DH is key agreement and DSA is signature, and they are not directly interchangeable, although they can be combined to do authenticated key agreement. Both the key exchange and digital signature algorithm are based on the difficulty of solving the discrete logarithm problem in the multiplicative group of integers modulo a prime p. Elliptic curve groups were proposed in 1985 as a substitute for the multiplicative groups modulo p in either the DH or DSA protocols. For the same level of security per best currently known attacks, elliptic curve-based systems can be implemented with much smaller parameters, leading to significant performance advantages. Such performance improvements are particularly important in the wireless arena where computing power, memory, and battery life of devices are more constrained. In this article we will highlight the performance advantages of elliptic curve systems by comparing their performance with RSA in the context of protocols from different standards. There are various standards bodies guiding the implementation of security protocols for the industry. Some of the organizations involved in standards activities are the Internet Engineering Task Force (IETF), American Bankers Association, International Telecommunications Union, IEEE, and National Institute of Standards and Technology (NIST). The IETF has working groups drafting standards for S/MIME, IPSec, and Transparent Layer Security (TLS). Using the Cryptographic Message Syntax (CMS) format, S/MIME specifies the protocols for exchanging signed encrypted messages or and is an alternative to PGP. IPSec is needed to establish virtual private network connections, and TLS is used to establish secure browser sessions. X.509 guides the issuing of certificates on parties public keys, and their management and revocation. In the last few years, working groups in each of these areas have added specifications for using elliptic curve groups through requestfor-comment drafts. At the level of specifying the mathematical operations underlying these protocols, the X9 organization of the American Bankers Association provides the standards ANSI X9.39 for RSA and mod p signatures, ANSI X9.62 for ECDSA and ANSI X9.63 for ECDH. Even more specific to elliptic curve cryptography is the IEEE P1363 published standard for describing implementation of elliptic curve operations. NIST provides a list of curves to be used, specified in FIPS 186-2, Digital Signature Standard. The performance advantages of elliptic curves in the SSL/TLS protocol have been analyzed in depth in [1], so we will only summarize those conclusions. The focus of this article will be to /04/$ IEEE IEEE Wireless Communications February 2004

2 Symmetric ECC DH/DSA/RSA ,360 Table 1. Key sizes for equivalent security levels (in bits). examine the impact of using elliptic curve cryptography in S/MIME instead. We will provide a brief introduction to elliptic curves in cryptography (ECC). We will give some background on S/MIME and summarize the protocols. We will present our conclusions about the performance advantages to be obtained by using elliptic curves in the wireless environment. We will explain a new application of elliptic curves in identitybased encryption that may help to launch deployment of a public key infrastructure. ELLIPTIC CURVES IN CRYPTOGRAPHY HISTORY OF ECC Elliptic curves were proposed for use as the basis for discrete logarithm-based cryptosystems almost 20 years ago, independently by Victor Miller of IBM and Neal Koblitz of the University of Washington [2, 3]. At that time, elliptic curves were already being used in various cryptographic contexts, such as integer factorization and primality proving. HISTORY OF ATTACKS Since then, many of the top mathematicians in algorithmic number theory have tried their hand at attacking elliptic curve discrete logbased cryptosystems, so far to little or no avail. Successful attacks have been found only for a few very special families of curves (e.g., the Menezes-Okomoto-Vanstone attack using the Weil pairing on supersingular elliptic curves). Versions of index calculus have been tried with no success. (Index calculus yields an attack on traditional mod p discrete log based cryptosystems by creating a factor base of small elements, finding relations between them, and solving a system of linear equations.) Weil descent has been proposed for embedding elliptic curves in higher-dimensional Abelian varieties where attacks are known, but has not yielded a good attack on elliptic curves in general. Currently, the best known attacks on elliptic curve discrete log systems run in time proportional to the square root of the group size of the elliptic curve, using Pollard rho, Pollard kangaroo, or BabyStepGiantStep algorithms. See [4, Ch. 5] for an overview of all these attacks. By comparison, much more efficient attacks are known for both RSA and mod p discrete log-based cryptosystems. For RSA, the attack goes via factoring using the Number Field Sieve (see, e.g., RSA-155 factorization [5]), and for mod p systems it is the index calculus attacks mentioned above. EQUIVALENT SECURITY LEVELS Therefore, currently, for the same level of resistance against the best known attacks, the system parameters for an elliptic-curve-based system can be chosen to be much smaller than the parameters for RSA or mod p systems. For example, an elliptic curve over a 163-bit field currently gives the same level of security as a 1024-bit RSA modulus or Diffie-Hellman prime. The difference becomes even more dramatic as the desired security level increases. For example, 571-bit ECC is currently equivalent in security to 15,360-bit RSA/DH/DSA. Public key protocols are used in combination with symmetric key algorithms. The overall strength of the system is the strength of the weakest link. Recently the new federal Advanced Encryption Standard (AES) was introduced, providing greater security than its symmetric key predecessor. At key lengths of 128, 192, and 256, AES has made ECC systems even more attractive as a key agreement alternative. Table 1 is found in a number of the standards documents (e.g., [6]). This growing difference in key bit length for equivalent security levels accounts for the performance advantages to be obtained from substituting ECC for RSA/DH/DSA in public key cryptographic protocols. ROLE OF GROUPS IN KEY EXCHANGE AND SIGNATURES The Diffie-Hellman Key Exchange and Digital Signature Algorithm can be described abstractly in the mathematical language of groups. A group is a set of elements with an operation specifying how to combine two elements to get another element of the set such that the operation satisfies certain technical properties. When we refer to mod p groups where p is some large prime number, we mean the set of natural numbers less than p where the operation is multiplication taking the remainder modulo p. A secret key exchange between two parties, A and B, can be achieved publicly if a group G and a fixed group element g are agreed upon, and if each generates a random number which they keep to themselves. If A generates the random number a and broadcasts the group element g a and B generates the random number b and broadcasts the group element g b, the common secret will be g ab, where the notation g a means to compose the element g with itself a times in the group. The security of this protocol depends on the discrete log problem being hard to solve in the given group. The discrete log problem is: given g a and g, find a. ELLIPTIC CURVE GROUPS For the purpose of cryptography, an elliptic curve can be thought of as being given by an affine equation of the form y 2 = x 3 + ax + b, where a and b are elements of a finite field with p n elements, where p is a prime larger than 3. (The equation over binary and ternary fields looks slightly different.) The set of points on the curve is the collection of ordered pairs (x, y) with coordinates in the field and such that x and This growing difference in key bit length for equivalent security levels accounts for the performance advantages to be obtained from substituting ECC for RSA/DH/DSA in public key cryptographic protocols. IEEE Wireless Communications February

3 Q 1 Q 1 + Q 2 = R 1 Q 2 R 1 Figure 1. Group law on an elliptic curve. R 1 y satisfy the relation given by the equation defining the curve, plus an extra point that is said to be at infinity. The set of points on an elliptic curve with coordinates in a finite field also form a group, and the operation is as follows: to add two points on the curve Q 1 and Q 2 together, pass a straight line through them and look for the third point of intersection with the curve, R 1. Then reflect the point R 1 over the x-axis to get R 1, the sum of Q 1 and Q 2. Thus, Q 1 + Q 2 = R 1. The idea behind this group operation is that the three points Q 1, Q 2, and R 1 lie on a common straight line, and the points that form the intersection of a function with the curve are considered to add up to be zero (Fig. 1). IMPLEMENTATION REFINEMENTS FOR ELLIPTIC CURVE CRYPTOGRAPHY To implement the Diffie-Hellman Key Exchange with an elliptic curve group, many iterations of the group operation must be performed. Therefore, it is important to optimize the implementation of the group operation. Many approaches have been explored, but choices about how to optimize the elliptic curve group operation often depend on the relative costs of operations such as multiplication and division of elements in the underlying field. AFFINE VS. PROJECTIVE COORDINATES Suppose we represent points on an elliptic curve with affine coordinates as described above. Then to add two points Q 1 = (x 1, y 1 ) and Q 2 = (x 2, y 2 ), where x 1 x 2, we first compute the slope of the line passing through them as λ = (y 2 y 1 )/ (x 2 x 1 ). This requires one division in the underlying finite field. Then solving for the third point of intersection of the line with the curve, we find that R 1 = (x 3, y 3 ), where x 3 = λ 2 x 1 x 2 and y 3 = (x 1 x 3 ) λ y 1. So forming the sum requires 1 division, 1 squaring, and 1 multiplication in the underlying finite field (p 2 or 3) when adding two affine points with distinct x-coordinates, and ignoring the cost of addition or subtraction in the field. Alternative representations for an elliptic curve and the points on it are also available. Projective and weighted projective (also called Jacobian) coordinates are sometimes used, especially in cases where division in the underlying field is costly. Weighted projective coordinates work with triples of coordinates (x, y, z), corresponding to the affine coordinates (x/z 2, y/z 3 ) whenever z 0. The advantage of weighted projective coordinates is that point addition on the elliptic curve can be done in 16 field multiplications, avoiding all field divisions. INVERSION/MULTIPLICATION RATIO Field divisions in prime fields are often reported to be roughly 80 times as costly computationally as multiplications in the field [7]. Such a ratio would clearly indicate the use of weighted projective coordinates instead of affine coordinates. However, this ratio is obtained when taking advantage of special modular reduction routines that can be used when the size of the underlying prime field has a particular form, called generalized Mersenne primes [8]. For arbitrary primes, where special modular reduction is not available, field multiplication costs are higher. For division in a finite field, a trick due to Lehmer is given in [9, p. 607] to improve the gcd algorithm for finding a modular inverse. Taking advantage of Lehmer s method can significantly cut the cost of doing field divisions. Together these two considerations lead to the fact that for random primes, a ratio of 5 or 10 to 1 is reasonable. Under these circumstances, the use of affine coordinates is warranted. STANDARD TECHNIQUES FOR FAST EXPONENTIATION Many different fast exponentiation techniques are used to perform group exponentiations. For example, to perform binary exponentiation, express the exponent as a binary string; then for each bit in the expansion, either perform a squaring or a squaring and a multiplication with the base, depending on whether bit 0 or 1 occurs in the expansion. More sophisticated and efficient versions of the binary method have been developed (e.g., [10]). Other methods available involve: 1) Windowing: using some precomputed values of the base and different window sizes to break up the binary expansion of the exponent into chunks to be processed iteratively 2) NAF: nonadjacent form of the exponent so that no two adjacent bits are both nonzero 3) Compressible exponents (See [4, pp ] for methods 1 and 2, and [11] for 3.) For elliptic curves, the group operation is written as addition instead of multiplication, and in that case exponentiation is more appropriately referred to as scalar multiplication, but the same techniques apply. For elliptic curves, the square-and-multiply technique described above is referred to as double-and-add. When using affine coordinates, a field multiplication 64 IEEE Wireless Communications February 2004

4 can be saved each time a double-and-add operation is performed in a scalar multiplication [12], leading to a more efficient implementation of elliptic curve cryptographic protocols for general elliptic curves. When field inversions are more costly than 6 field multiplications, another technique given in [13] is beneficial. It allows one to trade an inversion for 6 multiplications, and leads to an efficient algorithm for tripling a point on general elliptic curves. Finding further ways to improve elliptic curve scalar multiplication is an active area of research [7, 14, 15]. S/MIME OVERVIEW HISTORY MIME stands for Multipurpose Internet Mail Extensions, a specification for formatting messages so that they can be sent over the Internet. MIME was initiated in 1992 by the IETF. S/MIME stands for Secure MIME, and provides the following security services for electronic messages [16]: authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encryption). PROTOCOL Suppose two parties A and B wish to exchange signed encrypted messages. Assume that A and B already have their own public key/private key pairs, and have certificates on their public keys from some common trusted certificate authority (CA). If A wants to send a message to B, A can obtain the certificate on B s public key and check its validity. Then using B s public key, A encrypts a message to B (usually just a symmetric key that subsequently acts as the contentencryption key). A may include data such as a message encrypted with a symmetric key algorithm using the content encryption key. A then signs the whole message using its own private key. When B receives the data from A, B first checks the certificate on A s public key for validity. B then uses A s public key to verify A s signature on the message. B uses its own public key to decrypt the content encryption key and uses that key to decrypt the received data. (This is an informal description; compare with X.509 strong two-way authentication protocol for details [9, p. 511].) To analyze the work load on each party, note that the sender and receiver must each perform three public key operations. The sender, A, must: 1) Verify 1 signature (on B s certificate) 2) Perform 1 encryption (using B s public key) 3) Sign message The receiver, B, must: 4) Verify 1 signature (on A s certificate) 5) Verify 1 signature (on A s message) 6) Perform 1 decryption (using its own private key) Currently RSA certificates are often issued even on elliptic curve public keys. Certificates are signed only once but verified many times, and since only the CA must perform the expensive RSA signing operation using its private key, the individual parties do not incur much computational burden in performing the RSA signature Processor MHz 163-bit 192-bit 256-bit 384-bit 521-bit 1) Ultra SPARC II ) StrongARM ) Pentium II ) Pentium II Table 2. Sample elliptic curve exponentiation timings over prime fields (in milliseconds). Processor MHz 1024-RSA d 1024-RSA e 2048-RSA d 2048-RSA e 1) Ultra SPARC II ) StrongARM ) ARM7TDMI 1 12, Table 3. Sample RSA encrypt/decrypt timings (in milliseconds). verifications of the certificates. However, using an elliptic curve cryptosystem to perform steps 2, 3, 5, and 6 can significantly decrease the computational burden on the individual parties. PERFORMANCE ADVANTAGES COMPARISON OF ECC WITH RSA We will start by giving some sample timings for RSA and ECC on different platforms. In Table 2 rows 1 and 2 are taken from [1], and do not claim to be optimized, but show two different platforms and are directly comparable to RSA numbers for the same platforms. Rows 3 and 4 in Table 2 are taken from [7] and take advantage of the special form of the generalized Mersenne primes for the NIST curves given in [17] by using specialized routines for fast modular reduction for these primes [8]. Row 3 uses affine coordinates and a binary NAF for the exponent. Row 4 uses mixed Jacobianaffine coordinates and a windowed NAF for the exponent. In Table 3 RSA d is the private key operation, whereas RSA e is the public key operation. Rows 1 and 2 are from [1], as above in the elliptic curve timings. Row 3 is from [18]. COMPARISON At the 163-bit ECC/1024-bit RSA security level, an elliptic curve exponentiation for general curves over arbitrary prime fields is roughly 5 to 15 times as fast as an RSA private key operation, depending on the platform and optimizations. At the 256-bit ECC/3072-bit RSA security level the ratio has already increased to between 20 and 60, depending on optimizations. To secure a 256-bit AES key, ECC-521 can be expected to be on average 400 times faster than 15,360-bit RSA. IMPACT ON S/MIME For example, if elliptic curve cryptosystems are used in the S/MIME protocol for signing and encryption, the sender will perform an ECDSA signature and an ECDH key agreement opera- IEEE Wireless Communications February

5 The advantage of ID-Based Encryption is that no certificate is needed to bind names to public keys. This feature may help to launch a Public Key Infrastructure, since a receiver does not have to obtain a public key and a certificate before receiving encrypted communications. tion instead of an RSA signature and an RSA encryption. For the purpose of mobile communication, a StrongARM 200 MHz processor can be thought of as a typical device. Without assuming an optimized version of ECC, use row 2 of the ECC table instead of row 4. On such a device, at the current minimum 1024-bit security level, the difference in the computation time for the sender per message is roughly 47 ms instead of 200 ms. For the recipient of a message, it would mean performing an ECDSA signature verification and an ECDH operation instead of an RSA signature verification and an RSA decryption, so the difference would be about 79 ms instead of 200 ms/message. Using the optimized versions of ECC quoted in row 4, the costs for the sender and receiver per message can be cut to roughly 8 and 12 ms. At higher security levels (e.g., for keying AES-256), RSA operations will be far too costly computationally for such a small device (roughly 45 s for sender and receiver per message), whereas ECC will cost instead roughly 56 ms for the sender per message and 84 ms for the receiver per message. IDENTITY-BASED ENCRYPTION Another application of elliptic curves in cryptography has recently emerged in the form of a new system for doing Identity-Based Encryption. Identity-Based Encryption is a public key encryption scheme where any string can be a user s public key, including, for example, the user s address or name. The advantage of ID- Based Encryption is that no certificate is needed to bind names to public keys. This feature may help to launch a public key infrastructure, since a receiver does not have to obtain a public key and a certificate before receiving encrypted communications. The sender can use the receiver s ID as its public key, and does not need to obtain and verify a certificate on the recipient s public key beforehand. Once an encrypted communication has been received, a user can contact a central CA to obtain the secret key corresponding to its public key. Identity-based signatures were first proposed by Shamir in 1984 [19], and Maurer-Yacobi proposed identity-based key agreement in 1991 [20], but these schemes were not deployed due to heavy computational costs. In 2001 Boneh and Franklin proposed a scheme that can be implemented efficiently using elliptic curves and an associated pairing map [21]. The security of the new scheme depends on the assumption that a new problem, the Bilinear Diffie-Hellman (BDH) problem, is hard. BILINEAR PAIRINGS AND THE BILINEAR DIFFIE-HELLMAN ASSUMPTION Given two groups, G 1 and G 2, a bilinear map is a map that takes a pair of elements from G 1 and sends it to an element of G 2 in a way that satisfies several important properties. The most important property is that it be linear in each entry of the pair. In other words, let P and Q be elements of the group G 1 with an additive group law, and let r be a positive integer. Write the group law for G 2 multiplicatively, and let e(p,q) be the element of G 2 which is the pairing applied to P and Q. Then the pairing must have the property that e(rp,q) = e(p,q) r = e(p, rq). The mapping must be easy to compute, yet the following problem must be hard: (BDH) Given P, rp, sp, tp in G 1, find e(p, P) rst in G 2. AN IDENTITY-BASED ENCRYPTION SCHEME USING A BILINEAR PAIRING Suppose that a CA has a global secret key s, known only to the CA. Each user has a public key Q A which is an element of G 1 corresponding to the identity A. The secret key of user A is D A = sq A in G 1. Let P and sp in G 1 be global public parameters of the system, and h be a random oracle. To encrypt a message, m, to user A, generate a random number r, then send (U,V) = (rp, m h(e(q A, sp) r )). To decrypt, A obtains D A = sq A from the CA, and computes m = V h(e(d A,U)). This decryption procedure yields the correct message because of the bilinearity of the map, since e(q A,sP) r = e(d A,U). The security of the system depends on the assumption that the BDH problem is hard, since P, sp, rp, tp are known (Q A =tp for some unknown integer t), and the system would break if e(d A,U)= e(p,p) rst could be easily computed. WEIL PAIRING ON ELLIPTIC CURVES In [21], Boneh and Franklin proposed using the group of points on an elliptic curve for the group G 1, the Weil pairing on the elliptic curve as the bilinear map, and the multiplicative group of a finite field as the group G 2. An Identity-Based Encryption scheme based on elliptic curves and the Weil pairing can be efficiently implemented using the pairing algorithm given in [4, p. 43], and using optimizations found in [12]. CONCLUSIONS Over the last five years, elliptic curve cryptography has moved from being an interesting theoretical alternative to being a cutting edge technology adopted by an increasing number of companies. There are two reasons for this new development: one is that ECC is no longer new, and has withstood a generation of attacks; second, in the growing wireless industry, its advantages over RSA have made it an attractive security alternative. Wireless Internet mail industry leaders such as Qualcomm have embraced ECC, as well as other major companies in the wireless industry such as Motorola, Docomo, and RIM. Major computer companies such as IBM, Sun Microsystems, Microsoft, and Hewlett-Packard are all investing in ECC. The U.S. government is backing the use of ECC as well, with NSA creating the security requirements for wireless devices connecting to the military, and NIST providing 66 IEEE Wireless Communications February 2004

6 standardized curves for use in a range of applications of ECC. Smartcard companies such as Gemplus are also using ECC to improve their products security. Wireless devices are rapidly becoming more dependent on security features such as the ability to do secure , secure Web browsing, and virtual private networking to corporate networks, and ECC allows more efficient implementation of all of these features. REFERENCES [1] V. Gupta, S. Gupta, and S. Chang, Performance Analysis of Elliptic Curve Cryptography for SSL, ACM Wksp. Wireless Security, Mobicom 2002, Atlanta, GA, Sept. 2002, [2] V. S. Miller, Use of Elliptic Curves in Cryptography, H. C. Williams, Ed., Advances in Cryptology CRYPTO, LNCS, vol. 218, 1985, Springer-Verlag, 1986, pp [3] N. Koblitz, Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp [4] I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic Curves in Cryptography, London Math. Soc. Lecture Note Series, 265, Cambridge Univ. Press, [5] J. Cowie et al., World Wide Number Field Sieve Factoring Record: on to 512 Bits, Advances in Cryptology ASIACRYPT 96, Kyongju, Korea, LNCS, vol. 1163, Springer-Verlag, 1996, pp [6] Additional ECC Groups for IKE, Mar. 2001, ietf.org/proceedings/01dec/i-d/draft-ietf-ipsec-ike-eccgroups-03.txt [7] M. Brown et al., Software Implementation of the NIST Elliptic Curves over Prime Fields, D. Naccache, Ed., Topics in Cryptology CT-RSA 2001, LNCS, vol. 2020, Springer-Verlag, 2001, pp [8] J. Solinas, Generalized Mersenne Numbers, Tech. rep., 1999, /corr99-39.ps [9] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, [10] Daniel M. Gordon, A Survey of Fast Exponentiation Methods, J. Algorithms, vol. 27, no. 1, 1998, pp [11] Y. Yacobi, Discrete-log with Compressible Exponents, Advances in Cryptology CRYPTO 90, LNCS, vol. 537, Springer-Verlag, pp [12] K. Eisentraeger et al., Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation, M. Joye, Ed., Topics in Cryptology CT-RSA 2003, LNCS, vol. 2612, Springer-Verlag, 2003, pp [13] M. Ciet et al., Trading Inversions for Multiplications in Elliptic Curve Cryptography, preprint, 2003, iacr.org/ [14] J. Guajardo and C. Paar, Efficient Algorithms for Elliptic Curve Cryptosystems, B. S. Kaliski Jr., Ed., Advances in Cryptology CRYPTO, 1997, LNCS, vol. 1294, Springer-Verlag, 1997, pp [15] C. H. Lim and P. J. Lee, More Flexible Exponentiation with Precomputation, Y. G. Desmedt, Ed., Advances in Cryptology CRYPTO, LNCS, vol. 839, Springer-Verlag, 1994, pp [16] S/MIME Version 3 Message Specification, June 1999, [17] FIPS Pub 186-2, Digital Signature Standard (DSS), Jan. 27, 2000, [18] Performance of RSA on ARM and Palm, digisec.se/mcrypt_performance.htm [19] A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Advances in Cryptology: Proc. CRYPTO 84, LNCS, vol. 7, 1984, pp [20] U. Maurer and Y. Yacobi, Non-interactive Public Key Cryptography, Advances in Cryptography Eurocrypt 91, LNCS, vol. 547, Springer-Verlag, 1991, pp [21] D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, J. Kilian, Ed., Advances in Cryptology CRYPTO, 2001, LNCS, vol. 2139, Springer-Verlag, 2001, pp ADDITIONAL READING [1] Cryptographic Message Syntax, Aug. 2002, ietf.org/rfc/rfc3369.txt [2] IEEE Std , IEEE Standard Specifications for Public-Key Cryptography, IEEE Comp. Soc., Aug. 29, [3] Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS), Apr. 2002, [4] ECC Cipher Suites for TLS, Aug. 2002, sun.com/projects/crypto/ietf_internet-draft.pdf [5] Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002, rfc3279.txt [6] ECC in X.509, Working Group Draft, Aug. 1999, BIOGRAPHY KRISTIN LAUTER (klauter@microsoft.com) received her Ph.D. in mathematics from the University of Chicago in From 1996 to 1999 she was a Hildebrandt Assistant Professor of Mathematics at the University of Michigan and spent one year as a postdoctoral fellow at the Max Planck Institute for Mathematics, Bonn, Germany. Since 1999 she has been a researcher in the Cryptography and Anti-Piracy group at Microsoft Research, working on elliptic curve cryptography and related areas. She is the author of numerous articles published in mathematical journals and a co-editor of a volume on algebraic geometry. Wireless devices are rapidly becoming more dependent on security features such as the ability to do secure , secure Web browsing, and virtual private networking to corporate networks, and ECC allows more efficient implementation of all of these features. IEEE Wireless Communications February

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

Implementation of Elliptic Curve Digital Signature Algorithm

Implementation of Elliptic Curve Digital Signature Algorithm Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Lecture 25: Pairing-Based Cryptography

Lecture 25: Pairing-Based Cryptography 6.897 Special Topics in Cryptography Instructors: Ran Canetti and Ron Rivest May 5, 2004 Lecture 25: Pairing-Based Cryptography Scribe: Ben Adida 1 Introduction The field of Pairing-Based Cryptography

More information

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves

Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Blinding Self-Certified Key Issuing Protocols Using Elliptic Curves Billy Bob Brumley Helsinki University of Technology Laboratory for Theoretical Computer Science billy.brumley@hut.fi Abstract Self-Certified

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

An Approach to Shorten Digital Signature Length

An Approach to Shorten Digital Signature Length Computer Science Journal of Moldova, vol.14, no.342, 2006 An Approach to Shorten Digital Signature Length Nikolay A. Moldovyan Abstract A new method is proposed to design short signature schemes based

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

A SOFTWARE COMPARISON OF RSA AND ECC

A SOFTWARE COMPARISON OF RSA AND ECC International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 29 ISSN: 974-13 A SOFTWARE COMPARISON OF RSA AND ECC Vivek B. Kute Lecturer. CSE Department, SVPCET, Nagpur 9975549138

More information

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM

IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM NABI ET AL: IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM 28 IMPLEMENTATION AND PERFORMANCE ANALYSIS OF ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM Mohammad Noor

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

A New Efficient Digital Signature Scheme Algorithm based on Block cipher

A New Efficient Digital Signature Scheme Algorithm based on Block cipher IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 7, Issue 1 (Nov. - Dec. 2012), PP 47-52 A New Efficient Digital Signature Scheme Algorithm based on Block cipher 1

More information

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis by Susana Sin A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

Implementing Network Security Protocols

Implementing Network Security Protocols Implementing Network Security Protocols based on Elliptic Curve Cryptography M. Aydos, E. Savaş, and Ç. K. Koç Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331, USA {aydos,savas,koc}@ece.orst.edu

More information

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1 Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Public Key Cryptography symmetric key crypto v requires sender, receiver know shared secret

More information

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015

Digital Signatures. Meka N.L.Sneha. Indiana State University. nmeka@sycamores.indstate.edu. October 2015 Digital Signatures Meka N.L.Sneha Indiana State University nmeka@sycamores.indstate.edu October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital

More information

Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10

Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10 with Embedding Degree 10 University of California, Berkeley, USA ANTS-VII, 2006 Outline 1 Introduction 2 The CM Method: The Basic Construction The CM Method: Generating Families of Curves 3 Outline 1 Introduction

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: luca.veltri@unipr.it) Course of Network Security,

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Efficient Unlinkable Secret Handshakes for Anonymous Communications

Efficient Unlinkable Secret Handshakes for Anonymous Communications 보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

A Survey of the Elliptic Curve Integrated Encryption Scheme

A Survey of the Elliptic Curve Integrated Encryption Scheme JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME, ISSUE, AUGUST 010 A Survey of the Elliptic Curve Integrated Encryption Scheme 7 V. Gayoso Martínez, L. Hernández Encinas, and C. Sánchez Ávila Abstract

More information

CS 758: Cryptography / Network Security

CS 758: Cryptography / Network Security CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

Digital Signature. Raj Jain. Washington University in St. Louis

Digital Signature. Raj Jain. Washington University in St. Louis Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

Digital Signature Standard (DSS)

Digital Signature Standard (DSS) FIPS PUB 186-4 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute

More information

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1

EXAM questions for the course TTM4135 - Information Security May 2013. Part 1 EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Public Key Cryptography. Performance Comparison and Benchmarking

Public Key Cryptography. Performance Comparison and Benchmarking Public Key Cryptography Performance Comparison and Benchmarking Tanja Lange Department of Mathematics Technical University of Denmark tanja@hyperelliptic.org 28.08.2006 Tanja Lange Benchmarking p. 1 What

More information

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Modern/Public-key cryptography started in 1976 with the publication of the following paper. W. Diffie

More information

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Encryption/Decryption using Public Key Cryptography Network Security Chapter 2 Basics 2.2 Public Key Cryptography

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood

An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure

More information

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing

Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing S.Hemalatha, Dr.R.Manickachezian Ph.D Research Scholar, Department of Computer Science, N.G.M College, Pollachi,

More information

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction MATH 168: FINAL PROJECT Troels Eriksen 1 Introduction In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key

More information

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography

Public Key Cryptography. c Eli Biham - March 30, 2011 258 Public Key Cryptography Public Key Cryptography c Eli Biham - March 30, 2011 258 Public Key Cryptography Key Exchange All the ciphers mentioned previously require keys known a-priori to all the users, before they can encrypt

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

More information

Review of methods for secret sharing in cloud computing

Review of methods for secret sharing in cloud computing Review of methods for secret sharing in cloud computing Dnyaneshwar Supe Amit Srivastav Dr. Rajesh S. Prasad Abstract:- Cloud computing provides various IT services. Many companies especially those who

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first

More information

Multi-Layered Cryptographic Processor for Network Security

Multi-Layered Cryptographic Processor for Network Security International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

Runtime and Implementation of Factoring Algorithms: A Comparison

Runtime and Implementation of Factoring Algorithms: A Comparison Runtime and Implementation of Factoring Algorithms: A Comparison Justin Moore CSC290 Cryptology December 20, 2003 Abstract Factoring composite numbers is not an easy task. It is classified as a hard algorithm,

More information

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths NIST Special Publication 800-131A Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Elaine Barker and Allen Roginsky Computer Security Division Information

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

ARCHIVED PUBLICATION

ARCHIVED PUBLICATION ARCHIVED PUBLICATION The attached publication, FIPS Publication 186-3 (dated June 2009), was superseded on July 19, 2013 and is provided here only for historical purposes. For the most current revision

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com

Identity Based Encryption. Terence Spies VP Engineering terence@voltage.com Identity Based Encryption Terence Spies VP Engineering terence@voltage.com Voltage Security Overview Breakthrough technology for encryption and access control Based on work of Dr. Boneh at Stanford and

More information

Session Initiation Protocol Attacks and Challenges

Session Initiation Protocol Attacks and Challenges 2012 IACSIT Hong Kong Conferences IPCSIT vol. 29 (2012) (2012) IACSIT Press, Singapore Session Initiation Protocol Attacks and Challenges Hassan Keshavarz +, Mohammad Reza Jabbarpour Sattari and Rafidah

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Introduction to Cryptography

Introduction to Cryptography Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication

More information

LUC: A New Public Key System

LUC: A New Public Key System LUC: A New Public Key System Peter J. Smith a and Michael J. J. Lennon b a LUC Partners, Auckland UniServices Ltd, The University of Auckland, Private Bag 92019, Auckland, New Zealand. b Department of

More information

The Factoring Dead Preparing for the Cryptopocalypse

The Factoring Dead Preparing for the Cryptopocalypse The Factoring Dead Preparing for the Cryptopocalypse Thomas Ptacek, Matasano Tom Ritter, isec Partners Javed Samuel, isec Partners Alex Stamos, Artemis Internet Agenda Introduction The Math New Advances

More information

IT Networks & Security CERT Luncheon Series: Cryptography

IT Networks & Security CERT Luncheon Series: Cryptography IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

I N F O R M A T I O N S E C U R I T Y

I N F O R M A T I O N S E C U R I T Y NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y

More information

HASH CODE BASED SECURITY IN CLOUD COMPUTING

HASH CODE BASED SECURITY IN CLOUD COMPUTING ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

How To Encrypt Data With Encryption

How To Encrypt Data With Encryption USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security

More information

Public Key Cryptography of Digital Signatures

Public Key Cryptography of Digital Signatures ACTA UNIVERSITATIS APULENSIS No 13/2007 MATHEMATICAL FOUNDATION OF DIGITAL SIGNATURES Daniela Bojan and Sidonia Vultur Abstract.The new services available on the Internet have born the necessity of a permanent

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

Evaluation of Digital Signature Process

Evaluation of Digital Signature Process Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: esimion@fmi.unibuc.ro Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;

More information

Number Theory and Cryptography using PARI/GP

Number Theory and Cryptography using PARI/GP Number Theory and Cryptography using Minh Van Nguyen nguyenminh2@gmail.com 25 November 2008 This article uses to study elementary number theory and the RSA public key cryptosystem. Various commands will

More information

An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings

An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings Theoretical and Applied Informatics ISSN 896 5334 Vol.24 (202), no. 2 pp. 09 8 DOI: 0.2478/v079-02-0009-0 An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear Pairings

More information

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method

An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering

More information

Randomized Hashing for Digital Signatures

Randomized Hashing for Digital Signatures NIST Special Publication 800-106 Randomized Hashing for Digital Signatures Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February 2009 U.S. Department

More information

2. Cryptography 2.4 Digital Signatures

2. Cryptography 2.4 Digital Signatures DI-FCT-UNL Computer and Network Systems Security Segurança de Sistemas e Redes de Computadores 2010-2011 2. Cryptography 2.4 Digital Signatures 2010, Henrique J. Domingos, DI/FCT/UNL 2.4 Digital Signatures

More information

Lecture 2: Complexity Theory Review and Interactive Proofs

Lecture 2: Complexity Theory Review and Interactive Proofs 600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography

More information

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms Principles of Public Key Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter : Security on Network and Transport

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

Public Key Cryptography Overview

Public Key Cryptography Overview Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic

More information

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh

More information